4.3 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.001 Low
EPSS
Percentile
46.0%
The version of AXIGEN Webmail running on the remote host is earlier than 7.1.0. Such versions fail to fully sanitize text in the body of email messages. If an attacker can trick a user into opening a specially crafted message using the affected webmail application, this can be leveraged to inject malicious HTML and script code into the user’s browser, to be executed within the security context of the affected site.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(38911);
script_version("1.16");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/19");
script_cve_id("CVE-2009-1484");
script_bugtraq_id(34716);
script_xref(name:"Secunia", value:"34402");
script_xref(name:"Secunia", value:"34958");
script_name(english:"AXIGEN Webmail < 7.1.0 HTML Body Script Insertion");
script_summary(english:"Checks AXIGEN Webmail version");
script_set_attribute(attribute:"synopsis", value:
"The remote webmail service is affected by a cross-site scripting
vulnerability.");
script_set_attribute(attribute:"description", value:
"The version of AXIGEN Webmail running on the remote host is earlier
than 7.1.0. Such versions fail to fully sanitize text in the body of
email messages. If an attacker can trick a user into opening a
specially crafted message using the affected webmail application, this
can be leveraged to inject malicious HTML and script code into
the user's browser, to be executed within the security context of the
affected site." );
script_set_attribute(
attribute:"see_also",
value:"https://www.axigen.com/forum/forum/technical-news/1849-axigen-security-notification?t=5998"
);
script_set_attribute(
attribute:"solution",
value:"Upgrade to AXIGEN version 7.1.0 or later."
);
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_attribute(attribute:"exploitability_ease", value:"No exploit is required");
script_set_attribute(attribute:"exploit_available", value:"false");
script_cwe_id(79);
script_set_attribute(attribute:"plugin_publication_date", value: "2009/05/27");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:gecad:axigen_mail_server");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"CGI abuses : XSS");
script_copyright(english:"This script is Copyright (C) 2009-2021 Tenable Network Security, Inc.");
script_dependencies("http_version.nasl");
script_require_ports("Services/www", 8000);
exit(0);
}
include("global_settings.inc");
include("misc_func.inc");
include("http.inc");
port = get_http_port(default:8000, embedded:TRUE);
# Unless we're paranoid, make sure the banner is from AXIGEN's Webmail service.
if (report_paranoia < 2)
{
banner = get_http_banner(port:port);
if (!banner || "Server: Axigen-Webmail" >!< banner) exit(0);
}
# Get the version from the login page.
url = "/?login=";
res = http_send_recv3(method:"GET", item:url, port:port);
if (isnull(res)) exit(0);
if ("<title>AXIGEN Webmail - v" >< res[2])
{
foreach line (split(res[2], keep:FALSE))
{
if ("<title>AXIGEN Webmail - v" >< line && "</title>" >< line)
{
version = strstr(line, "<title>AXIGEN Webmail - v") - "<title>AXIGEN Webmail - v";
version = version - strstr(version, "</title>");
# There's a problem if the version is before 7.1.0.
if (version =~ "^([0-6]\.|7\.0([^0-9]|$))")
{
set_kb_item(name:'www/'+port+'/XSS', value:TRUE);
if (report_verbosity > 0)
{
report = '\n' +
'AXIGEN Webmail version ' + version + ' appears to be running on the remote host\n' +
'based on the following title on the initial login page :\n' +
'\n ' + line + '\n';
security_warning(port:port, extra:report);
}
else security_warning(port);
}
}
}
}
Vendor | Product | Version | CPE |
---|---|---|---|
gecad | axigen_mail_server | cpe:/a:gecad:axigen_mail_server |